First published: Mon Apr 03 2017(Updated: )
udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux kernel | >=3.2<3.2.76 | |
Linux kernel | >=3.3<3.4.113 | |
Linux kernel | >=3.5<3.10.103 | |
Linux kernel | >=3.11<3.12.53 | |
Linux kernel | >=3.13<3.14.77 | |
Linux kernel | >=3.15<3.16.35 | |
Linux kernel | >=3.17<3.18.45 | |
Linux kernel | >=3.19<4.1.40 | |
Linux kernel | >=4.2<4.4.21 | |
Android | <=7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10229 has a high severity level due to its potential to allow remote code execution.
To fix CVE-2016-10229, ensure your Linux kernel is updated to version 4.5 or later, and apply any relevant security patches.
CVE-2016-10229 affects various versions of the Linux kernel prior to 4.5 and certain Android versions up to 7.1.1.
CVE-2016-10229 allows remote attackers to execute arbitrary code through specially crafted UDP traffic.
If you are running an affected version related to CVE-2016-10229, immediately check for updates and apply them to mitigate the risk.